Firefox Relay : comment protéger votre adresse e-mail (Guide 2023)
Un article signé GOODTECH.info Introduit en 2020, Firefox Relay est un service visant à préserver la confidentialité de votre adresse e-mail grâce à la création d’un alias de messagerie. Comment ça marche ? Comment s’inscrire ? Suivez notre guide. L’alias de messagerie vous aide à conserver votre identité privée et à réduire le spam. Lancé par Mozilla il y a […]
Des AirPods Pro USB-C pour aller avec l’iPhone 15 ?
La vague des vacances d’été étant en approche, les rumeurs concernant les nouveaux produits d’Apple qui seront présentés à la rentrée vont commencer à prendre un rythme de croisière.
L’écran de mon iPhone ne s’allume plus : comment déverrouiller et faire une sauvegarde ?
C’est le cauchemar de tout possesseur d’iPhone : un matin, l’appareil refuse de s’allumer, l’écran clignote ou reste désespérément noir, que faire ?
Unpatched WordPress Plugin Flaw Could Let Hackers Create Secret Admin on 200,000 Sites
As many as 200,000 WordPress websites are at risk of ongoing attacks exploiting a critical unpatched security vulnerability in the Ultimate Member plugin. The flaw, tracked as CVE-2023-3460 (CVSS score: 9.8), impacts all versions of the Ultimate Member plugin, including the latest version (2.6.6) that was released on June 29, 2023. Ultimate Member is a popular […]
Beware: New ‘Rustbucket’ Malware Variant Targeting macOS Users
Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes with improved capabilities to establish persistence and avoid detection by security software. « This variant of Rustbucket, a malware family that targets macOS systems, adds persistence capabilities not previously observed, » Elastic Security Labs researchers said in a report
Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks
Charming Kitten, the nation-state actor affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC), has been attributed to a bespoke spear-phishing campaign that delivers an updated version of a fully-featured PowerShell backdoor called POWERSTAR. « There have been improved operational security measures placed in the malware to make it more difficult to analyze and collect intelligence, »
3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage
In today’s fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way organizations operate. From chatbots to generative AI models, these SaaS-based applications offer numerous benefits, from enhanced productivity to improved decision-making. Employees using AI tools experience the advantages of quick answers and accurate results, enabling
WhatsApp Upgrades Proxy Feature Against Internet Shutdowns
Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of content that can be shared in conversations. This includes the ability to send and receive images, voice notes, files, stickers and GIFs, WhatsApp told The Hacker News. The new features were first reported by BBC Persian. Some of the other […]
Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign
An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into a proxy network. « This is an active campaign in which the attacker leverages SSH for remote access, running malicious scripts that stealthily enlist victim servers into a peer-to-peer (P2P) proxy network, such as Peer2Profit or Honeygain, » Akamai researcher Allen West […]
NIS2 : renforcer la sécurité grâce à la PKI et à la gestion des certificats
NIS2 encourage notamment les entreprises à adopter une approche proactive, en mettant l’accent sur la gestion des risques, la réponse aux incidents et la collaboration de l’écosystème mais également à intégrer une PKI et une gestion des certificats.